Security systems

The Security Industry Association (SIA) – as part of its Women in Security Forum initiative – will host a breakfast event during ISC West featuring insights from special guest Juliette Kayyem, a national leader in America’s homeland security efforts. The SIA Women in Security Forum Breakfast at ISC West will take place Friday, April 12, in Room 1001/1004 of the Sands Convention Center at 8:30 a.m.
Kayyem previously served as President Obama’s assistant secretary for inte...

ReconaSense announces the latest release of its A.I. powered security platform for life safety and physical security, featuring risk adaptive access control and new IoT and building automation integrations that enable the secure flow of people, processes and information while keeping risks at bay.
Digital transformation has increased the volume, variety and velocity of physical security event data being collected and stored, increasing the complexity of potential security risk factors as well a...

A hyperconverged infrastructure is a software-defined environment in which various elements of a physical security system – computing, storage and networking – are combined together and run more efficiently on fewer hardware devices. Rather than each element of a system being represented by a physical hardware device, those elements are combined on a cluster of hardware devices.
Hypervisor software separates a computer's operating system and applications from the underlying physica...

Employees from Hikvision USA Inc., a provider of security hardware equipment and software solutions, worked with non-profit Mission 500 to assemble 250 backpacks with school supplies for students who attend East Hartford, Conn.-area Title 1 schools.
Members of Hikvision’s Northeast regional team volunteered at Mission 500 partner World Vision’s Teacher Resource Center in East Hartford, Conn. The resource center warehouses donated learning and classroom supplies that are provided to...

MOBOTIX, global manufacturer of premium-quality secure IP video systems, is responding to the latest news about the use of non-secure hardware and software in IT or network infrastructures. Global players from the U.S. have already reacted and banned certain manufacturers from public contracts. Australia has also forbidden the use of products from certain manufacturers that are under suspicion of facilitating unauthorized access to data or not being able of warding off hacker attacks via cells o...

News

In preparation for ISC West, the largest converged security and public safety industry trade show, the Security Industry Association (SIA) has identified the top technology advancements to look out for at ISC West 2019. The “Top 8,” presented with ISC Security Events, represent the key technology advancements impacting the converged security and public safety landscape.
The “Top 8” Security Technologies At ISC West 2019:
Cloud
Artificial intelligence
Robotics/autonomous systems
Mobile credentials
Security audio
Facial biometrics
5G LTE
Voice control
Ever-Converging Physical And Cybersecurity As physical and cybersecurity continue to converge within the broader security industry, SIA and ISC West are regularly keeping a close pulse on the latest trends
As physical and cybersecurity continue to converge within the broader security industry, SIA and ISC West are regularly keeping a close pulse on the trends driving this industry transformation. Together, they present what SIA has identified as the most significant technology-first issues impacting the industry and made recommendations for security professionals looking to further their education at the show.
ISC West will be held April 9-12 (SIA Education@ISC: April 9-11, 2019 | Exhibit Hall: April 10–12, 2019) at the Sands Expo Center in Las Vegas, Nevada, drawing over 30,000 security professionals and over 1,000 exhibitors and brands.
A more detailed look at the Top 8 security advancements at ISC West:
Cloud:
Video surveillance as a service (VSaaS) is a growth area this year, as more companies deliver solutions that move recording, storage, management, analytics and monitoring solutions to the cloud. As SIA director of standards Joseph Gittens notes, this is especially common in residential video solutions, which often have low camera counts.
Artificial Intelligence (AI):
AI is permeating many security product categories but is most visible at ISC West in video security systems. Attendees will see analytics applications for automated motion detection and trespassing detection, advanced algorithms performing identification and categorization of persons and objects within scenes and systems that can even analyse human behavior within scenes such as long line queues and crowded situations. AI is also being used more extensively in the intrusion and alarm systems categories AI is also being used more extensively in the intrusion and alarm systems categories
AI is also being used more extensively in the intrusion and alarm systems categories, with the promise of AI being able to leverage combined data from multiple sensors to help reduce false alarms and enhance home automation. Other firms are even offering AI solutions to identify cyber threats and network intrusions.
Robotics/Autonomous Devices:
Driven primarily by advancements in AI, power storage and mobility, steady improvements are being made in robot and drone security solutions. SIA notes that many of the companies are taking a managed service approach, allowing users to “rent” the services that these robots and drones provide.
Mobile credentials:
While a true mobile credentialing explosion may be a few years away, SIA expects the public to become more comfortable using mobile devices to complete transactions outside of access control. Mobile credentialing may expand into more commercial security installations, and industries will increasingly migrate to systems that incorporate all facets of identity management into unified systems capable of granting and managing access rights.
Security Audio:
Audio has long been a component of security systems, particularly with intercoms, emergency notification platforms and public address systems, but the industry is now delivering specialized solutions which can actively monitor audio and apply analytics to the audio –enabling functions like automated alerts on possible aggression. SIA adds that audio is proving to be a value-added augmentation to video security systems. SIA adds that audio is proving to be a value-added augmentation to video security systems
Facial Biometrics:
Thanks to popular consumer efforts like Apple’s Face ID and Windows Hello for Microsoft Windows 10, facial recognition has become less of the curiosity from futurist movies and more of a common place logical and physical access solution. As facial biometrics have proliferated in consumer technology, so has the technology advanced in professional solutions. SIA expects to find more presence of this solution on the show floor, particularly as verification accuracy increases and competition makes solutions more affordable.
5G LTE:
With the major telecommunications firms in the process of planning their networks to support 5G LTE, which could deliver nearly 10 gigabits of data per second to a cellular phone, IoT solutions that use cellular connectivity will no longer be limited to the throughput of today’s 4G speeds.
Expect to see early glimpses of technology solutions, particularly mobile video security solutions with applications primarily in public safety and smart cities –even though full 5G LTE networks are still in development and are not widely available from most carriers.
Voice Control:
With smart speaker adoption growing dramatically in 2018 (up 24 percent in Q2 2018 according to Nielsen), these solutions are being integrated into residential technology ecosystems. Look for new products in the areas of home security and home automation to have existing or available integration with common voice control/smart speaker providers like Amazon and Google. Voice control and natural language processing will also likely augment video analytics
Augmented Video Analytics
Voice control and natural language processing will also likely augment video analytics. According to SIA, in today’s analytics, users still need operators with a level of database/querying skills to find a particular event or scene, but the ability to say “Show me all persons in red shirts carrying an object who entered through door three” will prove much faster than waiting on an operator to input that analytic query manually.
“Each year at ISC West, the largest audience in the security industry gathers to strengthen business connections, learn and see the latest trends in security technology,” said SIA CEO Don Erickson. “SIA is proud to be the premier sponsor of ISC West and looks forward to engaging with influential attendees through our compelling SIA Education@ISC education and training sessions, networking events and the SIA New Product Showcase.”
ISC West 2019
In addition to connecting with nearly a thousand companies on the show floor, ISC West attendees will have access to 85 top-quality training sessions led by SIA. SIA Education @ ISC West provides critical information on the newest technologies in security.
“ISC West has been a driving force in bringing together and educating the security and public safety community for more than 50 years. As the industry moves towards a converged mindset for physical and cyber security, it’s critical we’re addressing the technology-specific trends our attendees are looking to learn more about,” said Will Wise, group vice president, security portfolio, Reed Exibitions. “With SIA’s collaboration, we’re able to put forth this cheat sheet so attendees can easily identify the topics they care about and all the ways we can help them learn more.”

At ISC West, in booth # 26061, Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence will unveil a new version of Security Center, the company’s open-architecture platform that unifies video surveillance, access control, automatic license plate recognition (ALPR), communications, and analytics.
With customisable live dashboards, enhanced privacy protection features, a brand-new map-driven mobile app, and new functionalities that help users actively monitor the health of their system and ensure compliance with cybersecurity best practices, version 5.8 will ensure that users can optimize their physical security environment while benefiting from greater visibility into their operations.
Valuable Contributing Sensor
Security Center 5.8 will introduce a brand-new collaborative mobile app to provide operators complete access to their Security Center system
Security Center 5.8 will enable users to create custom dashboards that will display real-time data, such as video feeds, alarms, reports and charts in a way that is meaningful to them and their specific job function (security, operations, IT etc.). Users can set up their dashboards using simple point-and-click tools, and instantly combine data from the entire Genetec portfolio (video, access control, ALPR, etc.) in one screen to gain a new perspective on the evolution of events and key metrics across their operations.
Security Center 5.8 will introduce a brand-new collaborative mobile app to provide operators complete access to their Security Center system when they are on the move and allow them to turn their smartphone into a valuable contributing sensor to their security system.
Map-Oriented Interface
In addition to recording incidents, accessing nearby video, access control, and ALPR devices as well as sharing video from their phones to Security Center, the new mobile app will let operators share their location with colleagues in the operations center, send in-app messages and share live and recorded video through an intuitive map-oriented interface. Key features will include:
Video (live and recorded playback, PTZ controls, bookmarking, time- and event-based reports)
Access control (check door status, lock/unlock doors, override schedule, set maintenance mode etc.);
ALPR (live reads/hits, plate reports, and access hotlists);
Interactive maps that increase local awareness and put critical information much closer to the operators, enabling them to easily visualise their environment and respond quickly.
Built-in messaging allows for instantaneous sharing of information between operators and personnel in the field. This extends to sharing live or recorded video clips, text messages and other security information.
Physical Security Devices
With the new KiwiVision Camera Integrity Monitor feature, the system will also automatically detect potential camera position changes
System administrators are acutely aware of the critical nature of security systems, but often lack the tools to assess the potential exposure of their software, operating systems and physical security devices. Security Center 5.8 will introduce a new Security Score feature to track each system’s compliance with hardening guidelines, firmware availability and updates, password strength, as well as several other dimensions of cybersecurity.
Available through the built-in System Health dashboard, the Security Score will measure individual cybersecurity processes and verify that they are followed by the system. This will enable users to get a better understanding of the cyber security risks they face and enable them to take the necessary steps to harden their system.
With the new KiwiVision Camera Integrity Monitor feature, the system will also automatically detect potential camera position changes, loss of image quality or tampering, and alert administrators immediately. This allows them to get ahead of problems and take the necessary corrective action immediately, rather than wait to find out there is a problem when they need footage and it is not available.

Allied Universal, the security services provider in North America with headquarters in Santa Ana, CA and Conshohocken, PA, announces that Caisse de dépôt et placement du Québec (‘CDPQ’) announces a strategic investment in Allied Universal alongside company management and Warburg Pincus and Wendel, its current financial partners. The transaction values Allied Universal at more than US$7 billion.
The investment from CDPQ will support the long-term growth and strategy of the largest provider of integrated manned guarding security services in North America. Part of CDPQ’s investment also consists of up to approximately $400 million of primary capital which will be used by the Company to pursue its growth strategy and execute on its pipeline of attractive M&A opportunities.
Accomplishing Great Things
With annual revenues of approximately US$7 billion and more than 210,000 employees at over 38,000 client sites, Allied Universal is the largest and fastest growing security solutions provider in North America. The Company offers a mix of comprehensive manned guarding security services and innovative technology solutions, including systems integration and remote monitoring, to a broad and diversified group of customers.
“I am very proud to have one of the world’s leading institutional investors commit to Allied Universal and back our vision for success”, said Steve Jones, Chief Executive Officer of Allied Universal. “Our team has worked hard to build the best security company in the world. We are all excited about the future of Allied Universal as well as our plans for continuing to grow both organically and through strategic acquisitions in both the manned guarding and technology sectors. We look forward to accomplishing great things with CDPQ as our long-term partner.”

The provider of industrial lighting, Larson Electronics LLC, releases a solar-powered LED surveillance tower that features two IP security cameras, four 265-watt solar panels, a 1,000aH capacity battery bank with a battery charger, a solar generator and a telescoping mast that deploys eight LED light heads and the two security cameras up to 20 feet.
The entire assembly is mounted on a single axle aluminum trailer for easy transportation, making this light tower ideal for remote and rugged locations. The SPLT-1.06K-LM20-8XWP50-2XPTZ.23X-2TB-AT-BC-W4G is a complete, portable solar-powered surveillance system for outdoor and remote locations.
Providing High Performance
This solar security assembly comes with a 2TB, 8-channel network video recorder compatible with two-way audio streaming
This powerful security system is equipped with two cutting-edge 1080p full HD high-resolution security cameras that provide operators with precise 20x optical zoom, integrated long-range IR LEDs with an 850nm wavelength, day/night capabilities, MP4 format, as well as H.264 and MJPEG video compression. These IP cameras are IP66 rated providing high performance in outdoor locations. These explosion proof cameras with Power over Ethernet (PoE) features enable data transfers and power to be passed through a single Ethernet cable.
This solar security assembly comes with a 2TB, 8-channel network video recorder compatible with two-way audio streaming. Installation only takes minutes via plug-and-play, which automatically detects, displays and configures system components.
Withstand Demanding Conditions
When using the NVR, operators may access a 1080p monitor that is virtually borderless, for side-by-side screen setups that flow together almost seamlessly. This video recorder accepts USB mouse and keyboard inputs.
The four included 265-watt solar panels generate a total maximum output of 1.06 KW and have a 45-degree tilt for optimized sunlight exposure
The four included 265-watt solar panels generate a total maximum output of 1.06 KW and have a 45-degree tilt for optimized sunlight exposure. The tower is equipped with eight 50-watt LED lights. The light assemblies each consist of four 12.5-watt LEDs paired with high purity specular optics to produce a light output distance comparable to that of a 400-watt metal halide. The LED wall packs are housed in a waterproof aluminum housing that is powder coated for added durability and resistance to corrosion and designed to withstand demanding conditions of an outdoor environment.
Effective Monitoring System
Each lamp can be powered on individually, allowing operators to power one lamp or all eight lamps at a single time. Rounding out this security solution is a NEMA 3R component control box with a component cooling system, and 1.06 kW solar generator. Connectivity features are facilitated by a 4G/LTE rugged router. Equipped with built-in security, the unit offers 600 Mbps internet speeds (minimum). The internal router can be utilised to monitor uptime and for real-time alerts. Customers must provide their own 4G service/plan for the router, as the system does not come with an internet plan.
“The SPLT-1.06K-LM20-8XWP50-2XPTZ.23X-2TB-AT-BC-W4G is a total security package, ideal for live events, outdoor surveillance and other law/military applications,” said Rob Bresnahan, CEO of Larson Electronics LLC. “The IP camera, solar panels, high output LED lights, generator, battery bank and the tower/trailer assembly that pulls it all together provides operators with an effective monitoring system for temporary and outdoor jobs.”

ISS - Intelligent Security Systems – has pragmatically engineered a unique position in the Video Management System (VMS) category driven by the company’s documented innovations in analytics.
The combination of ISS’ powerful SecurOS VMS with numerous natively developed analytics solutions provides users across a multitude of business categories and applications with unique capabilities. This unique level of embedded system intelligence continues to be validated by multiple patents awarded to ISS for advanced analytics.
Integrating Analytics And SecurOS VMS
“ISS has taken a unique approach to VMS system development by seamlessly integrating our exclusive analytics and innovative SecurOS VMS platform to deliver solutions that resolve users’ longstanding and emerging needs,” said Aluisio Figueiredo, CEO of Intelligent Security Systems.
“This unique combination of VMS and analytics expertise not only detects and documents events, it provides the rich data necessary to analyze what may otherwise be perceived as disparate events, so management can be alerted to impending threats, abnormalities or policy/municipal violations. At ISS, we refer to it as ‘intelligent video defined.’”
Patents Awarded To ISS For Analytics Innovations:
Systems and methods for recognizing symbols in images for LPR/ANPR applications– methods or arrangements for reading or recognizing printed or written characters or for recognizing patterns, e.g. fingerprints using printed characters having additional code marks or containing code marks, e.g. the character being composed of individual strokes of different shape, each representing a different code value.
Systems and methods for evaluating readings of gauge dial
Systems and methods for recognizing symbols
Systems and methods for dewarping images – interpolation-based scaling, e.g. bilinear interpolation
Systems and methods for dewarping images – panospheric to cylindrical image transformation

Cylance Inc., global provider of AI-driven, prevention-first security solutions, has announced the availability of its award-winning endpoint protection offering, CylancePROTECT on AWS Marketplace.
CylancePROTECT AI-Enabled Platform
Cylance has built the largest AI platform in the industry, enabling it to offer a portfolio of security solutions ranging from enterprise endpoint protection, detection, and response, to Smart antivirus for consumers, to OEM solutions. Under the new agreement with AWS, marketplace customers now have access to CylancePROTECT for advanced AI-driven protection across all Windows, Mac, and Linux (including Amazon Linux) instances.
The lightweight Cylance agent offers high performance and resiliency and requires only minimal updates to its multi-generational AI model, providing powerful data science capabilities using deep learning algorithms designed to protect against future threat variants.
AI And Deep Machine Learning
Cylance leads the evolution of endpoint security using sophisticated machine learning techniques"
“Cylance leads the evolution of endpoint security using sophisticated machine learning techniques across our entire platform to protect more than 14.5 million endpoints,” said Didi Dayton, vice president of worldwide channels and alliances at Cylance.
He adds, “As an Advanced Partner in the AWS Partner Network, we’re pleased to be extending our prevention offering to AWS Marketplace customers, who can now easily find, procure, and install our award-winning AI technology to protect against zero-day polymorphic attacks and packed or obscured threats.”
Seamless Software Integration
CylancePROTECT integrates with key technologies like Netskope and Splunk, JASK, Aruba HPE, Bitglass, Demisto, Phantom, Thycotic, Securonix, and more, all of which can be purchased on AWS Marketplace to further extend a strong AI security posture. CylancePROTECT available on AWS Marketplace is designed for easy installation and operationalization. Paired with support from a trusted advisor from the Cylance professional services team, customers can be up and running right away, allowing them to focus on their business knowing their environment is secure.

Expert commentary

Should ‘Made in China’ be seen as a negative in security systems and products? It’s an important and complex issue that merits a more detailed response than my recent comment in the Expert Panel Roundtable.
For me, there are two sides of the answer to this question:
Buying products that have certain negative attributes that are not in alignment with some part of a belief system or company mandate.
Buying products that do not perform as advertised or do something that is unacceptable.
For integrators and end users making the buying decisions, the drive to purchase products may not be based on either aspect and instead on the product that can do the best job for their business. But for others, a greater emphasis on the ethical implications of purchasing decisions drives decision-making.
What Is Ethical Consumption?
Ethical consumption is a type of consumer activism that is based on the concept of ‘positive buying’ in that ethical products are favoredEthical consumption — often called ethical consumerism — is a type of consumer activism that is based on the concept of ‘positive buying’ in that ethical products are favored, and products that are ethically questionable may be met with a ‘moral boycott’. This can be as simple as only buying organic produce or as complex as boycotting products made in a totalitarian regime that doesn't offer its citizens the same freedoms that we enjoy in the United States.
Consider the goals of the Boston Tea Party or the National Consumers League (NCL), which was formed to protect and promote social and economic justice for consumers and workers in the United States and abroad.
Some examples of considerations behind ethical consumption include fair trade, treatment of workers, genetic modification, locally made and processed goods, union-made products and services, humane animal treatment, and in general, labor issues and manufacturing practices that take these factors into account.
Increase In Ethical Consumption
The numbers show that ethical consumption is on the rise. In a 2017 study by Unilever, 33 percent of consumers reported choosing to buy and support brands that they believe are doing social or environmental good. In the same study, 53 percent of shoppers in the United Kingdom and 78 percent in the United States said they feel better when they buy products that are ‘sustainably’ produced.
There’s clear evidence that products from some Chinese companies suffer from cybersecurity vulnerabilities
Though the aforementioned question that sparked this conversation centers around concerns with products made in China, there are many other countries where, for example, governments/dictators are extremely repressive to all or parts of their populations, whose products, such as oil, diamonds, minerals, etc., we happily consume. There are also a number of countries that are a threat in terms of cybersecurity. It may be naive and simplistic to single out Chinese manufacturers.
Impact On Physical Security Products
Product buying decisions based on factors other than product functionality, quality and price are also starting to permeate the security marketplace. While this hasn't been a large focus area from the business-to-business consumption side, it's something that should be considered for commercial security products for a variety of reasons.
Hardware hacks are more difficult to pull off and potentially more devastating"
There’s clear evidence that products from some Chinese companies suffer from cybersecurity vulnerabilities. Last fall, 30 U.S. companies, including Apple and Amazon, were potentially compromised when it was discovered that a tiny microchip in the motherboard of servers built in China that weren't a part of the original specification.
According to a Bloomberg report, “This attack was something graver than the software-based incidents the world has grown accustomed to seeing. Hardware hacks are more difficult to pull off and potentially more devastating, promising the kind of long-term, stealth access that spy agencies are willing to invest millions of dollars and many years to get.”
This, along with many other incidents, are changing the considerations behind purchasing decisions even in the physical security industry. Given that physical security products in general have been lax on cybersecurity, this is a welcome change.
Combating Tech-Specific Threats
In early January, members of the U.S. Senate introduced bipartisan legislation to help combat tech-specific threats to national security posed by foreign actors and ensure U.S. technological supremacy by improving interagency coordination across the U.S. government. The bill creates the Office of Critical Technologies & Security at the White House, an indication that this issue is of critical importance to a number of players across the tech sector.
Members of the U.S. Senate introduced bipartisan legislation to help combat tech-specific threats to national security posed by foreign actors
To address a significant number of concerns around ethical production, there are certifications such as ISO 26000 which provides guidance on social responsibility by addressing accountability, transparency, ethical behavior, respect for stakeholder interests, respect for rule of law, respect for international norms of behavior and respect for human rights.
While still emerging within physical security, companies that adhere to these and other standards do exist in the marketplace.
Not Buying Products Vulnerable To Cyberattacks
It may be counter-productive, even irresponsible, to brand all products from an entire country as unfit for purchasing. Some manufacturers’ products may be ethically questionable, or more vulnerable to cyberattacks than others; so not buying products made by those companies would make sense.
The physical security industry might be playing a bit of catch up on this front, but I think we're beginning to see a shift toward this kind of responsible buying behavior.

When dealing with a substantial, complex security system installation – often covering multiple sites and many hundreds of people – you clearly need a security vendor with the resources and experience to deliver. Smaller security companies may not have adequate means to support the longevity of these projects.
This generally isn’t an issue for larger companies, but beware - not all such companies are well placed to deal with large projects; that’s because not all of them have a formal process in place. Large security projects require clear KPIs and targets (including monthly commitments), ongoing review, regular clear communication and a dedicated team for consistency and continuity from start to finish.
Major Security System
Tying yourself to one manufacturer is rarely a good idea when it comes to large and complex security installs
If you don’t choose wisely, what you may end up with is company delivering a string of different people from different departments working on your installation at any given time, without a joined up approach. The person responsible for system design, for example, may never see your project when it’s actually being installed, which can lead to a potentially problematic and ultimately unsatisfactory outcome.
While every major security system design project will bring about its own set of challenges, the approach taken by the security vendor should remain consistent. Here’s what it should look like at the different stages of the project and what you should expect from your supplier. Tying yourself to one manufacturer is rarely a good idea when it comes to large and complex security installs.
Product Knowledge
Going down this route limits your options and you could end up with a security system that meets the vendor’s product portfolio rather than your needs. That doesn’t mean to say that a security company that is not affiliated to specific manufacturers won’t have close relationships with a range of them. A close relationship can be beneficial in terms of in-depth product knowledge and preferential pricing.
What’s most important is that the security company independently test and asses product rather than relying on manufacturers’ claims. They should continually appraise the marketplace to see what’s new and assess the value and relevance of product. They should also have the finger on the pulse of the security sector to identify where the market is going.
Team work is essential with large projects not only to get the job done, but also to manage any risk
Comprehensive Strategy
At STANLEY Security we very much focus on identifying technology solutions that minimize financial outlay for a client, such as video analytics. At present we are testing facial recognition systems which have grown in popularity and delivery.
A written, comprehensive strategy needs to be in place for the project, including forecasting that considers the longer timescales involved in large, complex projects and includes a ‘what if’ approach to ensure appropriate resource is available. So, for example, if a project looks like it is going to overrun due to unforeseen circumstances, you want to be sure you retain the same team on the project full time and that they are not transferred onto the next contract or dividing their time between the two.
Manage Any Risk
Team work is essential with large projects not only to get the job done, but also to manage any risk. Your vendor must have an experienced Major Project Team with a clear structure, so everyone knows their role and you know who you are dealing with at any given time.
Although it’s the last stage of the project, Commission & Handover has the potential to be the most difficult and is where costs can escalate
If subcontractors are being used by the security company, which is quite usual for very large installations and for particular specialisms (e.g. control room modelling), then a process needs to be in place to manage them and you need to be made aware of this. Although it’s the last stage of the project, Commission & Handover has the potential to be the most difficult and is where costs can escalate.
High Security Requirements
This is where the dedicated Major Project Team is vital as they will know the project inside out and have worked on it from start to finish, helping to avoid any end of project issues.
Large, complex security systems, especially those with high security requirements, are not easy to deliver. They require skillful, experienced hands, substantial resources in both financial and staffing terms, and a clear, consistent procedure that everyone is fully aware of. Don’t assume that just because you are dealing with a large security vendor they will have all of these in place; think like a security professional and ask to see the evidence!

According to the reports of not-for-profit organization Gun Violence Archive, the year 2018 has seen 323 mass shooting incidents as of November 28 in the United States. This number is 346 for the year 2017 and 382 for 2016 (more statistics are available here), with “mass shooting” defined as cases where four or more people are shot or killed in the same time period and location.
While definitions of mass shooting vary with organizations in the US, the count of over 300 incidents per year, or about once per day on average, is simply alarming. It raises public safety concerns, ignites debates and protests, which in turn lead to public unrest and potentially more violence, and increases costs for governments from the regional to federal level. Most importantly, the loss of lives demands not only improvement in post-incident handling and investigation, but also new prevention technologies.
Gunshot Detection Solutions
AI weapon detection offers a more efficient alternative to prevent active shooting
There are several gunshot detection solutions in the security market, commonly used by law enforcement agencies to detect and locate gun fires. These systems function based on acoustic recordings and analyses and often in combination with signals detected by sensors of the optical flash and shockwave when a gun is fired. However, gunshot detection by nature dictates that the law enforcement can only react to a shooting incident that has occurred. With fast action, law enforcement can prevent the incident from escalating, but lives that are lost cannot be recovered.
With the development of artificial intelligence in object recognition, AI weapon detection offers a more efficient alternative to prevent active shooting: AI can visually detect guns based on their shapes before they are fired. The AI is trained to recognize firearms in different shapes, sizes, colors, and at different angles in videos, so that the AI weapon detector can be deployed with existing cameras systems, analyze the video feeds, and instantly notify security staff when a gun is spotted.
Comparison of the advantages for law enforcement and public security agencies
Legacy gunshot detection using sensors
AI weapon detection
Reactive measure: detect after guns have been fired
Proactive measure: detect before guns are fired
Time to action: within 1 second
Time to action: within 1 second
Unable to provide visual data about shooter(s)
Can provide data about shooter(s) based on the camera recording: clothing, luggage (backpack, handbag, etc.), facial features, vehicle
Unable to track the location of the shooter(s) before and after shooting because of the lack of sound
Can track the shooter(s) using AI Person & Vehicle Tracking, AI Face Recognition, and AI License Plate Recognition
False detection caused by similar sound such as fireworks and cars backfiring
Minimal to no false detection, as AI can distinguish different types of handguns and rifles from normal objects (umbrella, cellphone, etc.)
Require physical deployment of gunshot detection sensors
Can be used with existing camera systems, do not require special hardware
Complicated to deploy, require highly trained professional
Easy to deploy as an add-on to existing video surveillance system
-
Can integrate with gun-shot detection to create a “double knock” audio and video active shooter alert system
Gun-Shot Detection Advantages
In addition to advantages for law enforcement and public security agencies, this type of visual-based pre-incident detector has three-fold advantages for the public:
Save lives by spotting the shooter before the shooting event.
Minimize the chaos entailing an incident: panic and chaos caused by a shooting incident often adds to injury, as people run, fall, trample on others… With an AI weapon detector, when a gun is spotted, the system sends an alert to security staff, who can quickly control the situation in an organized manner and apprehend the intending shooter.
Can be added as a SaaS (Security as a Service) component to small business and home surveillance systems, e.g., intrusion detection alerts (home invasion incidents with firearms number over 2500 per year nationwide).
For a complete active shooter detection system, video-based AI detector can operate in conjunction with gunshot detectors for enhanced security. Traditional X-ray based weapon detection or metal detection entrance systems are complicated and expensive; with AI video technology, active shooter detection system can be cost-effective, and after all, what price tag can one put on a life?
Written by Paul Sun and Mai Truong, IronYun

Security beat

Security is arguably at the heart of the United States partial government shutdown: President Trump’s demand for $5.6 billion to start building a wall along the southern border with Mexico is the major bone of contention as gridlock in Washington prevents passage of a spending bill to keep the government in full operation.
The partial government shutdown has affected security in other ways, too, and some of the impact could continue long after the impasse is settled. Some 800,000 federal employees are impacted, some on full or partial leave as a result of the shutdown and others working without knowing when they will get paid.
Cybersecurity Initiatives Delayed
Furloughed federal employees tasked with cybersecurity are not on hand to address the constant threat to government IT systems from possible hackers and other bad actors. In fact, hackers may decide the government shutdown is a vulnerable time to launch an attack.
Data capture form to appear here!
Hackers may decide the government shutdown is a vulnerable time to launch an attack Specifically, the new Cybersecurity Infrastructure Security Agency, launched last fall, is operating with a skeleton staff. If the shutdown encourages cybersecurity experts to seek other employment, the resulting drain of “knowledge capital” could be a lasting detriment.
New cybersecurity initiatives are also being delayed, such as the 21st Century Integrated Digital Experience Act, aimed at creating a baseline of security defense across government web sites. Some government websites have had their Transport Layer Security (TLS) encryption certificates expire during the shutdown.
Impact On TSA Agents
Although Transportation Security Administration (TSA) agents remain on the job at major airports, they will not be paid again until after the shutdown is over. The resulting negative impact on morale has arguably slowed down airport security operations, although airports have not reported any major problems.
In addition, some agents have called in “sick” and/or sought other employment to provide income during the shutdown. In the Dallas-Fort Worth airport, the number of agents calling out sick reportedly increased by 200% to 300%. The absences can aggravate existing TSA staffing shortages.
Impact On Border Protection Agents
Customs and border protection agents are also on the job with no assurance of when they will be paid. Other immigration agents in the Department of Homeland Security are also currently without pay. Hearings on immigration cases are being canceled, which can result in a large backlog to be addressed after the shutdown ends.
Customs and border protection agents are also on the job with no assurance of when they will be paid
What About Worker Documentation?
A consequence of the shutdown is unavailability of the government’s E-Verify system, which is used to verify a worker’s immigration status prior to being hired by an employer. During the lapse in government appropriations, employers will not be able to access their E-Verify accounts, create an E-Verify case, edit company information, terminate accounts, run reports, etc.
Long-Term Impact On Government Employment
The longer the shutdown continues, the more employees will be encouraged to seek work elsewhere The shutdown may lead federal employees to seek work in the private sector, where their paycheck is not likely to be delayed because of a political impasse. The longer the shutdown continues, the more employees will be encouraged to seek work elsewhere, whether on a temporary basis or as a permanent alternative. Manpower shortages can translate into security risks.
Trump has argued for funding of the border wall on security and humanitarian grounds and has sought to put pressure on newly empowered Democrats. However, adding physical barriers at the border is only part of the solution to border security, says the conservative Heritage Foundation. Also needed are improved technology to monitor the border and appropriately equipped border patrol agents.
Holistic Approach To Border Security
This holistic approach of combining barriers, technology, and people is the cost-effective way to secure the border, says Heritage Foundation. It’s also important to enforce immigration laws, and border security does nothing to stop visa overstays, another source of illegal immigration.
The Democratic opposition has said Trump’s urgent call to build the wall is a “manufactured crisis,” and the wall would be “immoral” and “ineffective.” Weeks into the impasse, there is no end in sight.

Security integrators are often tasked with a multitude of responsibilities which could include a variety of installation, integration or design tasks made up of sprinkler systems, fire alarms, access control, HVAC, video surveillance systems and networks; and then pile on maintenance, training and analytics.
Traditionally, most security integrators have installation backgrounds but are now expected to be IT savvy, too. Even the most proficient IT professionals may not fully grasp the complexity of adapting computer servers for use with video systems.
It’s not the area of expertise of security integrators as the complexities between IT data and video data are significant. Therefore, security integrators depend on system builders to provide solutions to meet the needs of video systems expertly and with few hassles. It’s a simple enough ask, but not so easy to deliver. Tom Larson, Chief Technology Officer, BCDVideo, lists some of the challenges:
Data capture form to appear here!
The Gap Between Reality And Customer Expectations
End users should expect a security integrator to provide services and a wide product line to ensure the right equipment for any size job
Sometimes there is a gap between what a security integrator expects from a video surveillance solution (in terms of validation testing, dependability, technical support) and the performance of available choices, especially in the case of low-cost or generic equipment. Extra service and support are needed to bridge the gap. Unfortunately, some manufacturers entering the market have failed to deliver, and integrators (and their end user customers) have paid a price.
The Network Is Often Overlooked
Security integrators should pay special attention to engineering the network and calculating the bandwidth and storage needed for video projects, especially given how technology evolves so quickly. Security is an appliance-driven business, and integrators who just want to add another server to expand storage or functionality without configuring the network run the risk of i/o bottlenecks and other system failures. End users should expect a security integrator to provide services and a wide product line to ensure the right equipment for any size job. Unfortunately, traditional IT resellers are often married to a singular solution limiting their knowledge of a good fit for the job.
Buying a video server based on a low price aggravates the problem, as “Frankensteined” or generic servers tend to generate additional costs over time
Servers Are Mistakenly Considered A One-Time Expense
One mistake purchasing agents make and security integrators have a hard time quantifying is viewing video storage as a capital expense (as one more component of a security system) rather than considering ongoing operating expenses. Buying a video server based on a low price aggravates the problem. “Frankensteined” or generic servers tend to generate additional costs over time, such as firmware or supply chain issues, and some systems builders have failed to provide support to offset those costs. In fact, the high costs over time of supporting inexpensive servers have been unsustainable for some system builders, who have left integrators and end users holding the bag, and in some cases, the liability.
Adapting To Sustainable Strategies
“Systems builders to the video surveillance market must adapt and invest to meet the demands of security integrators’ expectations, and they need a business model that enables them to provide a substantial level of support and commitment,” says Larson. “Working with high-quality manufacturers and providing tried-and-tested, certified equipment upfront ensures manageable costs over the life of the system. Products that are fully tested and contain no firmware bugs ensure smoother installations. By providing adequate technical support to the security integrator and managing IT variables over the life of the system, the systems builder makes it possible for a security integrator to specify and install a video server as easily as any other system component.”
Keeping IT professionals on staff to deal with server issues is cost-prohibitive for security integrators
Taking a longer-term view and considering total cost of ownership is a more sustainable strategy for integrators, says Larson. Investing upfront in a higher-quality server is rewarded by dependability and lower service costs over the life of the system. And the lower costs of supporting a higher-quality server create a more sustainable business model for the integrator, thus ensuring the integrator and end user will have ongoing support.
Adapting Server Technology To Video Applications
Security integrators deliver a different skill set than IT integrators, who tend to be more hands-on in terms of updating firmware and providing maintenance. Keeping IT professionals on staff to deal with server issues is cost-prohibitive for security integrators, who therefore depend on systems builders to provide that expertise. They develop a long-term relationship with a systems builder they can depend on to meet their needs for each job.
Larson says the best scenario for a security integrator is a combination of a high-quality server systems builder that understands the specific needs of the security integrator market. Adapting server technology to video applications requires knowledge of both disciplines. Dependable technology adapted to the needs of the video channel ensures successful installations and happy, long-term customers.

How’s this for a simple access control scenario? You walk up to a door, wave your hand in front of a button, the button lights up, and the door opens. That’s the simplified user experience that startup Openpath is promoting as it enters the crowded and mature market for physical access control.
Openpath says a simple user experience provides the extra boost needed for mobile credentialing to gain momentum. In this case, it’s even simpler than using a card credential (no searching in a bag or purse for the card). And there’s no personal identification number (PIN) code to remember; no “intrusive” biometric element that can concern some users. James Segil, President and Co-Founder of Openpath, says the simplified process “uses fewer thought cycles.”
Reliability of the system comes from Openpath’s SurePath triple-connect technology
“We wanted to make mobile access control that people want to use and can use safely and with ease,” he says. “We wanted to make using a smart phone for access control easier and more reliable than using a keycard.”
Simplified User Operation
In the simplified scenario, the mobile credential resides on a smart phone that can remain tucked away in the user’s purse or pocket. The credential remains active without the user needing to open an app. The wave of the hand signals intent, which causes the button to light up, activate and the door is ready to open. Segil says the simplicity of operation has contributed to the system seeing an unheard-of 94% adoption rate among users.
Reliability of the system comes from Openpath’s SurePath triple-connect technology. The smart phone credential is delivered using Bluetooth, WiFi or LTE (cellular) – whichever signal reaches the reader first enables the door to be opened. So even if a company’s WiFi is down or Bluetooth proves unreliable, there is still a third option.
Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems
Seamless Cloud Integration
Segil is a serial entrepreneur who has had experiences as a frustrated user, dealing with many different offices, people and access control deployments over the years – subletting office space, changing PIN codes, dealing with 10 different offices using 10 different cards. Based on that experience, Openpath’s founders saw a need for a more user-centric approach to access control, and a chance to improve the office experience to be more aligned with employees’ experiences in their smart homes.
Segil says he also saw “significant lethargy” among incumbent players in the access control space, and a market in which mobile and cloud technologies had still not taken hold. In addition to a simplified user experience built around mobile credentialing, Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems. The “elegant” readers, including a flush-mounted version, fit in well with high-end office environments. The company launched in May 2018.
Openpath has been signing up national and regional channel partners all across the U.S.
Openpath is focused on the commercial real estate market, where they have already seen significant adoptions, especially among mid-sized companies. Larger deployments as part of new construction are in the pipeline.
National System Integration
In the past six months since its launch, Openpath has been signing up national and regional channel partners all across the U.S. and now has a nationwide footprint and is able to service customers all over the U.S. They are not yet disclosing any specifics about the number of partners they have signed up and who they are. “I can share that we have a number of large national system integration and security brands on board as channel partners and many more regional and local system integrators,” says Segil. They are looking for additional integrator partners. “There is a cohort of folks out there who say ‘I get it,’ and I want to offer it to my customers,” says Segil. The cloud element of the system can provide recurring monthly revenue (RMR).
Openpath’s system offers flexibility in terms of meeting each customer’s security needs. In addition to the “super convenient” scenario described above, the system can also be configured to be “super secure,” using two-factor authentication and other measures, says Segil. There are multiple “flavors” between the two extremes. It can also be integrated with elevators to enable the buttons on allowed floors.
Integration With Existing Systems
Cloud software simplifies operation for both tenants and landlords. The system is backwards-compatible to existing systems and can be used to retrofit and mobile-enable a legacy system, providing the benefits of mobile features and cloud operation to multiple sites. The software can interface with enterprise applications such as Active Directory, and an application programming interface (API) facilitates integration with other systems and building components. It operates with marketing automation platforms such as Flack and visitor management systems such as Envoy.
The system is backwards-compatible, providing the benefits of mobile features and cloud operation to multiple sites
Open standards make the system easy to install in new or existing buildings using RS485, or Cat 5 or Cat 6 wiring, whatever is in place. Retrofit installations can use existing panels, servers, software, etc., or they can be replaced. The Openpath panel is installed right next to an existing panel in a retrofit and preserves all legacy integrations of the previous system.
Access Credentials Compatibility
In its simplest configuration, the Openpath system consists of single or four-door panels wired using standard ports, Wiegand ports and REX ports, each connected to software in the cloud. Each panel works offline if the internet connection is down. Various key fobs, cards and other credentials are available in addition to mobile credentials.
Openpath was one of the new exhibitors at last fall’s GSX show in Las Vegas, occupying a large-sized booth for a startup company. The “beautiful” hardware drew a lot of attention, says Segil. “The channel loves us, and we signed a lot of people,” he adds. “We were excited by the response.”

Case studies

Aston University, Birmingham, is transforming security and safety with the introduction of SafeZone for students and staff on campus and those traveling globally.
The SafeZone solution, from CriticalArc, will put users directly in touch with the university’s security control room using their mobile phone, enabling them to request help, trigger an emergency response, receive rapid notifications in the event of emergencies and benefit from a wide range of customer-care services. SafeZone was selected following a detailed comparison of alternative systems, says Mark Sutton, Head of Security and Emergency Planning at Aston University.
Resource Management Capabilities
“While some alternatives offered individual features that were attractive, none of them combined all the functions and benefits in the way that SafeZone does,” he says.
What we are investing in is a comprehensive solution that allows our security team to engage much more closely with students and staff"
“What we are investing in is a comprehensive solution that allows our security team to engage much more closely with students and staff, and to work in a more integrated way with the university’s various departments and within its senior management structure. It also gives us important additional functions including lone worker protection and resource management capabilities.” The technology works by letting Aston’s control room operators pin-point the locations of individuals who elect to check-in using a simple app on their smart phones, including staff, students, service users and members of the security team.
Reporting Suspicious Activity
This app makes it easy for students, staff and school’s using the system to communicate directly with security responders, calling for help, asking for advice, reporting suspicious activity etc. And in return security teams can send out alerts and safety instructions to groups or individuals, in specific locations, as individuals or by specified user type. Notifications can range from helpful advice to alerts regarding specific threats.
Officers responsible for emergency response management can also monitor activity patterns of those who choose to check-in, seeing where people are gathering during an incident for example. And they can co-ordinate resources, keeping track of where known first aiders are, or seeing exactly how team members are deployed, minute by minute.
Significant Placements Program
The benefits of SafeZone bring together features found in an assortment of systems – including lone-worker protection - making them available in a unified, scalable package. There are also new options for users to collaborate with the growing global network of SafeZone system operators.
At Aston University stakeholders such as the students’ union, staff and department heads have been fully engaged in the roll-out of the new system
At Aston University stakeholders such as the students’ union, staff and department heads have been fully engaged in the roll-out of the new system. “Safety is a big issue, particularly for city center campuses,” says Mark Sutton. “Prospective students and parents want to know how well we look after our community, so we see SafeZone as an important new benefit.” Aston also has a growing international reputation and a significant placements program, with students and staff traveling around the world to work.
Safety Monitoring
With the ability to ‘geo-fence’ any location in the world that has a signal, the university’s security team will now extend the same level of customer care and safety monitoring to all users, whether they are on campus, in accommodation blocks or associated sites around the city, or working abroad, says Darren Chalmers-Stevens, Managing Director EMEA and APAC for CriticalArc.
“We are delighted to be working with Aston University’s security and emergency response team to help them provide the best available monitoring and protection for all their people, in all situations and wherever they are. In addition, they are benefiting from a wide set of extra functions which would otherwise have to be purchased separately - including lone worker protection and health & safety compliance.” There are also important, emerging benefits which CriticalArc is developing alongside its community of users, confirmed Darren Chalmers-Stevens. “These were discussed during our recent two-day user group conference in February.”

Manufacturer ROCKWOOL International A.S. has chosen Nedap’s Global Client Programme to secure its offices and factories worldwide. AEOS, the physical security platform by Nedap, installed during the program, enables ROCKWOOL to establish a truly global security policy and unified work processes.
An advanced project rollout, the Global Client Programme is developed for large multinationals and offers several benefits, including standardization across sites, shorter implementation times and cost efficiencies.
Standardizing Company’s Security Measures
The Global Client Programme connects all of ROCKWOOL’s factories and office premises, and standardises the company’s security measuresROCKWOOL has 28 factories across the world. The Global Client Programme connects all of these factories and ROCKWOOL’s office premises, and standardizes the company’s security measures throughout the world.
Fokko van der Zee, managing director at Nedap Security Management, says: “The implementation of a standardized security solution across the world is a complex process. It involves a large project spanning many years and involving many stakeholders, and demands a high level of project management. In the absence of a structured program with defined guidelines, a global security rollout is likely to be a stressful execution. That’s why we set up our carefully designed Global Client Programme.”
ROCKWOOL Digital Service Lead, Matthew Thorne, agrees: “We’ve worked with Nedap over the past few years and recently became a member of their Global Client Programme. Now we’re equipped with the people and tools we needed to standardize our physical security solution. The Global Client Programme also minimizes risk and guarantees compliance. It really meets our needs in every possible way.”
Central Security Platform Saves Money
The program helps achieve cost savings by avoiding initial setup costs per site and having one central security platform instead of severalThe Global Client Programme is designed to ensure monitoring and control during every step of the rollout process. Timon Padberg, responsible for business development at Nedap Security Management, explains: “The repetitive nature of local site deployments allows us to work with models and templates, such as standard proposal and calculation documents. We can therefore produce a scalable process that ensures uniformity and a consistently high quality of implementation across each site.”
By using the Global Client Programme, ROCKWOOL is aiming for uniformity and alignment across all sites. The program also helps achieve cost savings by avoiding initial setup costs per site and having one central security platform instead of several. Moreover, there are significant savings on operational and maintenance costs due to shared services and economies of scale.

On December 11 to 16, 2018, the 14th FINA World Swimming Championships was held at the Olympic and International Expo Center in Hangzhou, China. Nearly 1,000 world swimming stars from 178 countries and regions competed here, creating a new glory with breaking 9 world records and 22 event records. The Chinese team won three gold medals, five silver medals and five bronze medals with the total medal number ranking the third in the world.
The World Swimming Championships is one of the world's highest-level international swimming events. It is also the highest-standard individual international sporting event ever held in Hangzhou. For an international sporting event of this scale, the safety and security of the venues are of paramount importance.
Security Monitoring Equipment
As an important guarantee force for the security of the World Swimming Championships, Dahua Technology ensured the event’s safety with the host spirit and a great sense of responsibility. Dahua Technology once again shouldered the mission of guarding international events after successfully guaranteeing the G20 Hangzhou Summit.
Dahua Technology provided a complete set of professional intelligent security monitoring equipment and system solutions
In the periphery and outside of the venue, important entrances and exits, various passages and commanding points in the venues and security commanding headquarters, Dahua Technology provided a complete set of professional intelligent security monitoring equipment and system solutions, assisted the security department to establish security command headquarters, refined the security deployment of the venues and realized the full coverage of security monitoring from the periphery to the stadium and from the bottom to the commanding heights, facilitating the safe and smooth host of the 2018 Hangzhou FINA World Swimming Championships.
Intelligence Equipment
At the venue of the 2018 Hangzhou FINA World Swimming Championships - the surrounding area and interior of the Hangzhou Olympic and International Expo Center, Dahua Technology has teamed up to deploy a number of professional intelligent HD PTZ cameras, fiber cameras, bullet cameras, domes, transmission and other intelligence equipment, covering all areas within the venue, which helped the security department to control all corners inside and outside the stadium in real time so that to ensure the safety of the venue and the event.
Dahua Technology combined the requirements of ‘first-class venue facilities, first-class organization guarantee, first-class opening and closing ceremonies, and first-class city image’ in the Championships, focused on key links and built a set of intelligent security video management system with the support of advanced technology platform.
Integrated Control System
It integrated control system, storage and management, and enjoyed the advantages of simple deployment and operation, flexible combination, excellent performance, and a high level of security and stability. It turned the cameras inside and outside the stadium into ‘smart brains’ to guarantee the safety of every corner of the Championships, meeting the high-level security needs of the event.
Dahua Technology set the command and dispatch of the security department as the core
At the security command headquarters of the site, Dahua Technology set the command and dispatch of the security department as the core, with high-definition tiled LCD screens as the display carriers and brought more intuitive and flexible display and control to the security management of the venues before and after the event to ensure the real-time handling, efficient command and visual control of the entire venues, thus winning the praise of the security department leaders.
Display Control Equipment
On the evening of December 16, the 2018 FINA Annual Awards Ceremony was held at the Hangzhou International Expo Center. As a ceremony of the most authoritative awards, with the largest scale and the greatest number of world-class swimming athletes in the global water sports field, Dahua Technology assisted the security units to reuse a large number of equipment around the venue, including intelligent cameras, storage, management platforms and display control equipment, making sure the ceremony was successfully being held.
As an essential force in the escort 2018 World Swimming Championships, Dahua Technology actively devoted to the security work. Stationed professional and technical personnel were responsible for on-site equipment support, achieving zero failure of the equipment, successfully completion of the tasks, and winning the praise of the security department leaders.

Allot Communications Ltd., a global provider of innovative network intelligence and security solutions for service providers and enterprises worldwide, announces that Safaricom will be implementing a convergent network solution for its fixed and mobile customers. The tailored Allot solution features network analytics, advanced charging capabilities as well as Network Security and protection against DDoS.
“We have a long and valued relationship with Allot,” said Thibaud Rerolle, Safaricom’s Chief Technology Officer. “With the visibility, control and security solutions provided by Allot, we will deliver added value with heightened quality of experience and protection to our customers from the rising cybersecurity threats, including DDoS attacks, phishing and Cryptojacking.”
Protect Service Availability
Proactively optimize network resources and customer service plans to maximize revenues
By activating Allot’s network intelligence and security technologies, Safaricom is now better able to:
Protect service availability and quality by blocking inbound and outbound DDoS attacks,
Enhance quality of experience (QoE) through improved streaming quality,
Proactively optimize network resources and customer service plans to maximize revenues,
Turn detailed network, application and user data into actionable insights to drive customer satisfaction, and
Save on CAPEX costs.
“Safaricom joins several of the world’s largest global Tier 1 operators with its deployment of Allot,” comments Ran Fridman, EVP Global Sales at Allot. “I am confident the combined DDoS Secure and NetworkSecure convergent solution will bring value to Safaricom and its customers through a better, safer user experience as well as protection against a variety of online threats.”

CNL Software, a provider of Physical Security Information Management (PSIM) software, is pleased to announce that its award-winning PSIM technology was used to support a multiagency security program for Super Bowl LIII.
The company’s IPSecurityCenter PSIM solution is installed in the Atlanta Police Department’s Video Integration Center (VIC) and helps secure the city and surrounding metro area, keep the metro area’s transportation networks and systems safe, and to help law enforcement personnel make sense of the huge volume of video intelligence that is generated day-to-day and during large-scale events like Super Bowl.
Provide Law Enforcement
Atlanta is no stranger to hosting large-scale events, which includes a previous Super Bowl, and has invested in a multitude of surveillance, analytic, data fusion, and communications systems and technologies in recent years. The City has also established an innovative public-private partnership, known as Operation Shield, that effectively leverages the surveillance assets and infrastructure of other participating Atlanta metro area departments and agencies, including the City’s Metro Atlanta Rail and Transit Authority (MARTA) and Hartsfield Jackson International Airport, and the City’s business community, while also bridging communication gaps between and across them.
IPSecurityCenter by CNL Software integrates these disparate systems in the Atlanta Police Department’s VIC to provide law enforcement
IPSecurityCenter by CNL Software integrates these disparate systems in the Atlanta Police Department’s VIC to provide law enforcement and other public safety professionals with the data and video intelligence they need to effectively respond to incidents before they arrive on scene.
Crowd Size Monitoring
“Estimates are that nearly one million people traveled to Atlanta for Super Bowl Week. As with all major events, ensuring public safety and security is a big job and huge concern,” comments Mike Mostow, General Manager – Americas at CNL Software.
“IPSecurityCenter was installed in the VIC by the Atlanta Police Department to provide the real-time situational awareness and decision support they need to ensure public safety and security during large-scale special security events like Super Bowl LIII.” IPSecurityCenter PSIM is installed in some of the largest public safety and security programs in some of the world’s largest cities.
The platform enables the most intelligent integration of the widest range of disparate public safety, security, emergency management, and homeland defense system and sensor technologies, including video and video analytics, facial recognition, license plate recognition, crowd size monitoring, gunshot detection, chemical, biological, radiological/nuclear and explosives detection, geospatial mapping, and asset tracking.

MARSS NiDAR system has been selected to secure and protect a critical national infrastructure (CNI) site in the form of a major dam facility. The NiDAR command and control (C2) system has been selected to integrate a thermal camera and a sonar system to protect the dam from potential underwater and surface approaches.
NiDAR is an advanced long-range surveillance system designed to protect maritime and land-based critical infrastructure from air, surface and underwater approaches.
Tracking Objects In Real Time
NiDAR is sensor agnostic, enabling it to integrate with any existing hardware or systems, and due to its modular design, not only does it meet the current contract needs, but it also offers the flexibility to meet any future expansions or requirements.
NiDAR can track, monitor, detect, classify, and respond to multiple objects, 360° in real time
NiDAR can track, monitor, detect, classify, and respond to multiple objects, 360° in real time, of over 1000 known and unknown, air, surface and underwater objects thanks to the software algorithms. It can intelligently analyze and rank unknown objects to determine potential threat levels and automatically trigger the appropriate alert. When the user determined warning and alarm zones are breached the system can automatically or manual deploy integrated countermeasures to deter potential approaches and de-escalate threats.
Enhanced Awareness Picture
The intuitive C2 interface provides an enhanced awareness picture, in real-time, through a touchscreen user interface and multi touch control.
Rob Balloch, Sales Director of MARSS said, “NiDAR was chosen for this critical national infrastructure as it is robust and suited to all environments, however challenging. Its high availability and reliability, low maintenance and cost effectiveness makes it the perfect choice for any future growth, or change of requirements, with minimum disruption.”

Round table discussion

A basic tenet of sales is ABC – always be closing. But it's a principle that most professional salespeople would say oversimplifies the process. Especially in a sophisticated, high-tech market such as physical security, the required sales skills are much more involved and nuanced. We asked this week's Expert Panel Roundtable: What unique characteristics are required of salespeople in the arena of physical security systems?

The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?

The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?